default search action
Zahid Mehmood
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j40]Moiz Qureshi, Arsalan Khan, Muhammad Daniyal, Kassim Tawiah, Zahid Mehmood:
A Comparative Analysis of Traditional SARIMA and Machine Learning Models for CPI Data Modelling in Pakistan. Appl. Comput. Intell. Soft Comput. 2023: 3236617:1-3236617:10 (2023) - [j39]Abeera Ilyas, Saeed Mahfooz, Zahid Mehmood, Gauhar Ali, Mohammed Ahmed El-Affendi:
Two-Way Approach for Improved Real-Time Transmission in Fog-IoT-Based Health Monitoring System for Critical Patients. Comput. Syst. Sci. Eng. 46(3): 3815-3829 (2023) - [j38]Tanzila Saba, Amjad Rehman, Tariq Sadad, Zahid Mehmood:
Copy-move image forged information detection and localisation in digital images using deep convolutional network. J. Inf. Sci. 49(5): 1325-1334 (2023) - [j37]Farzana Kulsoom, Sanam Narejo, Zahid Mehmood, Hassan Nazeer Chaudhry, Ayesha Butt, Ali Kashif Bashir:
Correction to: A review of machine learning-based human activity recognition for diverse applications. Neural Comput. Appl. 35(7): 5591 (2023) - 2022
- [j36]Zahid Mehmood, Hassan Nazeer Chaudhry, Rizwan Ali Naqvi, Farzana Kulsoom, Asmaa Munshi, Muhammad Bilal:
Passive Framework of Sparse Region Duplication Detection from Digital Images. J. Sensors 2022: 1-16 (2022) - [j35]Farzana Kulsoom, Sanam Narejo, Zahid Mehmood, Hassan Nazeer Chaudhry, Ayesha Butt, Ali Kashif Bashir:
A review of machine learning-based human activity recognition for diverse applications. Neural Comput. Appl. 34(21): 18289-18324 (2022) - 2021
- [j34]Sarang Karim, Faisal Karim Shaikh, Bhawani Shankar Chowdhry, Zahid Mehmood, Usman Tariq, Rizwan Ali Naqvi, Adnan Ahmed:
GCORP: Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks. IEEE Access 9: 27650-27667 (2021) - [j33]Myasar Mundher Adnan, Mohd Shafry Mohd Rahim, Amjad Rehman, Zahid Mehmood, Tanzila Saba, Rizwan Ali Naqvi:
Automatic Image Annotation Based on Deep Learning Models: A Systematic Review and Future Challenges. IEEE Access 9: 50253-50264 (2021) - [j32]Sarang Karim, Faisal Karim Shaikh, Bhawani Shankar Chowdhry, Zahid Mehmood, Usman Tariq, Rizwan Ali Naqvi, Adnan Ahmed:
Corrections to "GCORP: Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks". IEEE Access 9: 67734-67735 (2021) - [j31]Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood, Shakoor Muhammad:
CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Clust. Comput. 24(2): 739-752 (2021) - [j30]Tanzila Saba, Tariq Sadad, Amjad Rehman, Zahid Mehmood, Qaisar Javaid:
Intrusion Detection System Through Advance Machine Learning for the Internet of Things Networks. IT Prof. 23(2): 58-64 (2021) - [j29]Tanzila Saba, Khalid Haseeb, Asghar Ali Shah, Amjad Rehman, Usman Tariq, Zahid Mehmood:
A Machine-Learning-Based Approach for Autonomous IoT Security. IT Prof. 23(3): 69-75 (2021) - [j28]Rehan Mehmood Yousaf, Hafiz Adnan Habib, Zahid Mehmood, Muhammad Bilal:
Image dehazing based on dark channel spatial stimuli gradient model and image morphology. J. Ambient Intell. Humaniz. Comput. 12(8): 8483-8495 (2021) - [j27]Tehmina Kalsum, Zahid Mehmood, Farzana Kulsoom, Hassan Nazeer Chaudhry, Amjad Rehman, Muhammad Rashid, Tanzila Saba:
Localization and classification of human facial emotions using local intensity order pattern and shape-based texture features. J. Intell. Fuzzy Syst. 40(5): 9311-9331 (2021) - [j26]Marriam Nawaz, Zahid Mehmood, Muhammad Bilal, Asmaa Mahdi Munshi, Muhammad Rashid, Rehan Mehmood Yousaf, Amjad Rehman, Tanzila Saba:
Single and multiple regions duplication detections in digital images with applications in image forensic. J. Intell. Fuzzy Syst. 40(6): 10351-10371 (2021) - [j25]Saira Khan, Naveed Abbas, Mansoor Nasir, Khalid Haseeb, Tanzila Saba, Amjad Rehman, Zahid Mehmood:
Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT). Multim. Tools Appl. 80(11): 17045-17065 (2021) - [j24]Maryam Zahid, Irum Inayat, Maya Daneva, Zahid Mehmood:
Security risks in cyber physical systems - A systematic mapping study. J. Softw. Evol. Process. 33(9) (2021) - 2020
- [j23]Arta Iftikhar, Mustansar Ali Ghazanfar, Mubbashir Ayub, Zahid Mehmood, Muazzam Maqsood:
An Improved Product Recommendation Method for Collaborative Filtering. IEEE Access 8: 123841-123857 (2020) - [j22]Adnan Mustafa Cheema, Syed Muhammad Adnan, Zahid Mehmood:
A Novel Optimized Semi-Blind Scheme for Color Image Watermarking. IEEE Access 8: 169525-169547 (2020) - [j21]Bibi Ruqia, Zahid Mehmood, Rehan Mehmood Yousaf, Muhammad Tahir, Amjad Rehman, Muhammad Sardaraz, Muhammad Rashid:
BoVW model based on adaptive local and global visual words modeling and log-based relevance feedback for semantic retrieval of the images. EURASIP J. Image Video Process. 2020(1): 27 (2020) - [j20]Bibi Ruqia, Zahid Mehmood, Rehan Mehmood Yousaf, Tanzila Saba, Muhammad Sardaraz, Amjad Rehman:
Query-by-visual-search: multimodal framework for content-based image retrieval. J. Ambient Intell. Humaniz. Comput. 11(11): 5629-5648 (2020) - [j19]Muhammad Rashid, Malik Imran, Atif Raza Jafri, Zahid Mehmood:
A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves. J. Circuits Syst. Comput. 29(11): 2050179:1-2050179:28 (2020) - [j18]Farheen Ramzan, Muhammad Usman Ghani Khan, Muhammad Asim Rehmat, Sajid Iqbal, Tanzila Saba, Amjad Rehman, Zahid Mehmood:
A Deep Learning Approach for Automated Diagnosis and Multi-Class Classification of Alzheimer's Disease Stages Using Resting-State fMRI and Residual Neural Networks. J. Medical Syst. 44(2): 37 (2020) - [j17]Maryam Zahid, Irum Inayat, Maya Daneva, Zahid Mehmood:
A security risk mitigation framework for cyber physical systems. J. Softw. Evol. Process. 32(2) (2020) - [j16]Mubbashir Ayub, Mustansar Ali Ghazanfar, Zahid Mehmood, Khaled Hamed Alyoubi, Ahmed S. Alfakeeh:
Unifying user similarity and social trust to generate powerful recommendations for smart cities using collaborating filtering-based recommender systems. Soft Comput. 24(15): 11071-11094 (2020) - 2019
- [j15]Zahid Mehmood, Anwar Ghani, Gongliang Chen, Ahmed S. Alghamdi:
Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics. IEEE Access 7: 113385-113397 (2019) - [j14]Uzma Sharif, Zahid Mehmood, Toqeer Mahmood, Muhammad Arshad Javid, Amjad Rehman, Tanzila Saba:
Scene analysis and search using local features and support vector machine for effective content-based image retrieval. Artif. Intell. Rev. 52(2): 901-925 (2019) - [j13]Amna Sarwar, Zahid Mehmood, Tanzila Saba, Khurram Ashfaq Qazi, Ahmed Adnan, Habibullah Jamal:
A novel method for content-based image retrieval to improve the effectiveness of the bag-of-words model using a support vector machine. J. Inf. Sci. 45(1) (2019) - [j12]Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Adeel Anjum:
Data hiding technique in steganography for information security using number theory. J. Inf. Sci. 45(6) (2019) - [j11]Zahid Mehmood, Ibraheem Haneef, Syed Zeeshan Ali, Florin Udrea:
Sensitivity Enhancement of Silicon-on-Insulator CMOS MEMS Thermal Hot-Film Flow Sensors by Minimizing Membrane Conductive Heat Losses. Sensors 19(8): 1860 (2019) - [j10]Rabeah Noor, Ahmed Khan, Aaliya Sarfaraz, Zahid Mehmood, Adnan Mustafa Cheema:
Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption. Soft Comput. 23(20): 9821-9829 (2019) - 2018
- [j9]Zahid Mehmood, Toqeer Mahmood, Muhammad Arshad Javid:
Content-based image retrieval and semantic automatic image annotation based on the weighted average of triangular histograms using support vector machine. Appl. Intell. 48(1): 166-181 (2018) - [j8]Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Zakir Khan:
An efficient forensic technique for exposing region duplication forgery in digital images. Appl. Intell. 48(7): 1791-1801 (2018) - [j7]Zahid Mehmood, Naila Gul, Muhammad Altaf, Toqeer Mahmood, Tanzila Saba, Amjad Rehman, Muhammad Tariq Mahmood:
Scene search based on the adapted triangular regions and soft clustering to improve the effectiveness of the visual-bag-of-words model. EURASIP J. Image Video Process. 2018: 48 (2018) - [j6]Khalid Mahmood, Husnain Naqvi, Bander A. Alzahrani, Zahid Mehmood, Azeem Irshad, Shehzad Ashraf Chaudhry:
An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment. Int. J. Commun. Syst. 31(18) (2018) - [j5]Zahid Mehmood, Muhammad Rashid, Amjad Rehman, Tanzila Saba, Hassan Dawood, Hussain Dawood:
Effect of complementary visual words versus complementary features on clustering for effective content-based image search. J. Intell. Fuzzy Syst. 35(5): 5421-5434 (2018) - [j4]Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Tanzila Saba:
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J. Vis. Commun. Image Represent. 53: 202-214 (2018) - [j3]Kanwal Yousaf, Zahid Mehmood, Tanzila Saba, Amjad Rehman, Muhammad Rashid, Muhammad Altaf, Shuguang Zhang:
A Novel Technique for Speech Recognition and Visualization Based Mobile Application to Support Two-Way Communication between Deaf-Mute and Normal Peoples. Wirel. Commun. Mob. Comput. 2018: 1013234:1-1013234:12 (2018) - 2017
- [j2]Muhammad Imran Shehzad, Yasir Ali Shah, Zahid Mehmood, Abdul Waheed Malik, Shoaib Azmat:
K-means based multiple objects tracking with long-term occlusion handling. IET Comput. Vis. 11(1): 68-77 (2017) - 2016
- [j1]Nouman Ali, Khalid Bashir Bajwa, Robert Sablatnig, Zahid Mehmood:
Image retrieval by addition of spatial information based on histograms of triangular regions. Comput. Electr. Eng. 54: 539-550 (2016)
Conference and Workshop Papers
- 2019
- [c2]Maryam Zahid, Irum Inayat, Atif Mashkoor, Zahid Mehmood:
Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight Simulator. DEXA Workshops 2019: 129-138 - 2017
- [c1]Rehan Mehmood Yousaf, Saad Rehman, Hassan Dawood, Ping Guo, Zahid Mehmood, Shoaib Azam, Abdullah Aman Khan:
Saliency Based Object Detection and Enhancements in Static Images. ICISA 2017: 114-123
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint